Cryptographic Application of Programmable Smart Cards

نویسندگان

  • István Zsolt BERTA
  • Zoltán Ádám MANN
چکیده

In a complex, smart card based system this feature turns smart cards from passive datastorage devices into active computational units. In fact they contain a tamper resistant secure one-chip microcomputer able to execute various cryptographic functions. Moreover, their potential can be extended after the issuance of the card by uploading various new applications. However, the limited resources of the card (e. g. 4Mhz 8-bit processor, 8 kilobytes of storage capacity) require special programming methods and restrictions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Protocol for Programmable Smart Cards

This paper presents an open protocol for interoperability across multi-vendor programmable smart cards. It allows exposition of on-card storage and cryptographic services to host applications in a unified, card-independent way. Its design, inspired by the standardization of on-card Java language and cryptographic API, has been kept as generic and modular as possible. The protocol security model...

متن کامل

Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-Phones

The paper deals with the implementation and benchmarking of cryptographic primitives on contemporary smart-cards and smartphones. The goal of the paper is to analyze the demands of today’s common theoretical cryptographic constructions used in privacy-enhancing schemes and to find out whether they can be practically implemented on off-the-shelf hardware. We evaluate the performance of all major...

متن کامل

A Dynamic Current Mode Logic to Counteract Power Analysis Attacks

Since their publication in 1998, power analysis attacks have attracted significant attention within the cryptographic community. So far, they have been successfully applied to different kinds of implementations (e.g. smart cards, ASICs, FPGAs) of cryptographic algorithms. To protect such devices against power analysis attacks, it has been proposed to use a dynamic and differential logic style f...

متن کامل

Secure and Efficient Crypto System Based On 128-Bit AES

The AES algorithm was selected in 2000 by the US National Institute of Standards and Technologies (NIST) as a replacement to the Data Encryption Standard (DES) cryptographic algorithm. It is based on Rijndael algorithm which is a symmetric-key algorithm that processes fixed data of 128-bit blocks. The AES algorithm is suited for an efficient implementation on a wide range of processors. It can ...

متن کامل

Smart Cards - Requirements, Properties, and Applications

Smart cards play an increasing role as 'active' security devices. Due to its microcomputer and programmable memory, a smart card can cater for the specific needs of the environment it is used in. Smart cards allow the secure handling and storage of sensitive data such as user privileges and cryptographic keys as well as the execution of cryptographic algorithms. They are secure tokens by means ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001